Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments

H Mahalingam, P Velupillai Meikandan, K Thenmozhi… - Mathematics, 2023 - mdpi.com
Cloud services offer doctors and data scientists access to medical data from multiple
locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore …

Healthcare with datacare—a triangular DNA security

SA Banu, AI Al-Alawi, M Padmaa, PS Priya… - Multimedia Tools and …, 2024 - Springer
One of the fastest-growing industries in recent years has been e-Healthcare. Many
cyberattacks and threats against patient confidentiality exist in electronic health records …

DNA-chaos governed cryptosystem for cloud-based medical image repository

N Chidambaram, K Thenmozhi, P Raj… - Cluster Computing, 2024 - Springer
Nowadays, digital medical images have become an essential source for the grand success
of e-health technology. At the same time, the massive storage also plays a vital role. One of …

Quantum steganography scheme and circuit design based on the synthesis of three grayscale images in the HSI color space

J Sun, W Wang, P Yan, H Zhang - Quantum Information Processing, 2023 - Springer
This paper presents a quantum image steganography algorithm based on HSI color space
embedding technique. To increase the security of sensitive information, a three-dimensional …

Novel asymmetrical color image encryption using 2D sine-power coupling map

J Tang, M Lu, Z Zhang, X Huang, T Huang, J Wang - Nonlinear Dynamics, 2024 - Springer
Recently, many existing image encryption schemes suffer from security vulnerabilities due to
system key leakage. In response to this issue, this paper proposes a novel asymmetric …

[HTML][HTML] Robust encryption framework for IoT devices based on bit-plane extraction, chaotic sine models, and quantum operations

MU Rehman, A Shafqiue - Internet of Things, 2024 - Elsevier
In the domain of Internet of Things (IoT) applications, quantum computers offer the promise
of addressing complex computational issues that traditional cryptographic methods find …

An authenticated spectrum acquirement and transmission of encrypted images over fusion centre

SS Shanthini, H Mahalingam, P VM… - Multimedia Tools and …, 2024 - Springer
These days, spectrum insufficiency is the most common issue. If the number of smartphone
users who access the radio spectrum grows, the radio spectrum becomes increasingly …

Block-based color image encryption algorithm by a novel memristor chaotic system and new RNA computation

Y Yang, D Yang - Physica Scripta, 2024 - iopscience.iop.org
The security of images is closely related to the protection of information privacy. We
proposed a novel 5D memory resistive chaotic system (5D-MRCS), which exhibits good …

[HTML][HTML] Local dynamics analysis of a four-dimensional hyperchaotic Lorenz system

Y Ren, L Zhou - Journal of Applied Mathematics and Physics, 2023 - scirp.org
The local dynamical behaviors of a four-dimensional hyperchaotic Lorenz system, including
stability and bifurcations, are investigated in this paper by analytical and numerical methods …

Edge detection steganography and quantum circuit design based on a novel fractal chaotic system

S Jing-yu, W Wan-ting, Z Jun, Z Shuang… - Quantum Information …, 2024 - Springer
A quantum image steganography algorithm based on edge detection is proposed. Firstly, a
new fractal chaotic system with good chaotic properties is proposed to improve the security …